Gartner Research

Root Document Enterprise Identity Management: Moving from Theory to Practice

Published: 03 June 2005

ID: G00203138

Analyst(s): Jamie Lewis, Mike Neuenschwander

Summary

At an enterprise scale, even mundane administrative tasks such as password resets and account lifecycle management become monumental challenges. In addition, enterprises now face ever-greater challenges in complying with regulations and securing information technology (IT) systems against attacks. This overview describes how enterprises benefit from identity management (IdM) technologies that offer a systematic approach to solving these administrative and regulatory conundrums.

Table Of Contents

Synopsis

Analysis

  • Business in the Online Medium
  • Virtualization of Identity
  • Better-Managed Identity Increases Need for Privacy
  • IdM Market: From Boutique to Mainstream
  • Next-Generation IdM
    • Architectural Backdrop for IdM: Distributed Services
    • Federation: A New Interoperability Approach
    • From Directory to Identity Services
    • Identity in the Platform
    • Creating an Auditable Enterprise Environment
  • The Enterprise Challenge
    • A Long but Inevitable Transition
    • The Clear Imperative

The Details

  • Realizing the VEN
  • The Evolution of IT
  • Digital Identity and the Virtual Enterprise
  • IdM Business Drivers
    • Reducing IT Costs
    • Increasing Security
    • Improving Regulatory Compliance
    • Enhancing the User Experience
    • Protecting and Managing Intellectual Property
    • Deploying and Leveraging Portals
    • Enabling New Business Models
    • Deploying Web Services
    • Meeting Business Needs
  • Digital Identity
    • The Technical View
    • Unique Identifiers
    • Credentials
    • Profiles
    • Identity of Things
  • Identity Management
  • IdM Process
    • Registration and Creation
    • Propagation
    • Maintenance and Management
    • Termination
    • Logging and Auditing
  • The Challenge
  • IdM Infrastructure: A Functional View
  • IdM Infrastructure: An Architectural View
    • Directory and Identity Services
    • Roles and Rules
    • Provisioning and Password Management
    • Delegated Administration and Self-Service
    • Authentication
    • Access Management
    • Identity Federation
    • Privacy and Regulatory Compliance
  • Creating Enterprise IdM Architectures

Conclusion

©2020 Gartner, Inc. and/or its affiliates. All rights reserved. Gartner is a registered trademark of Gartner, Inc. and its affiliates. This publication may not be reproduced or distributed in any form without Gartner’s prior written permission. It consists of the opinions of Gartner’s research organization, which should not be construed as statements of fact. While the information contained in this publication has been obtained from sources believed to be reliable, Gartner disclaims all warranties as to the accuracy, completeness or adequacy of such information. Although Gartner research may address legal and financial issues, Gartner does not provide legal or investment advice and its research should not be construed or used as such. Your access and use of this publication are governed by Gartner’s Usage Policy. Gartner prides itself on its reputation for independence and objectivity. Its research is produced independently by its research organization without input or influence from any third party. For further information, see Guiding Principles on Independence and Objectivity.

Already have a Gartner Account?

Become a client

Learn how to access this content as a Gartner client.